Posts by Collection

publications

A secure and efficient data integrity verification scheme for cloud-IoT based on short signature

Hongliang Zhu, Ying Yuan, Yuling Chen, Yaxing Zha, Wanying Xi, Bin Jia, and Yang Xin

In IEEE Access, 2019

A Survey of Cloud Storage Data Integrity Verification Technology Based on Provable Data Possession

Ying Yuan, Hongliang Zhu, Yuling Chen, Zhi Ouyang, Yang Xin, Yixian Yang

In Journal of Computer Engineering and Applications, 2019

SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

Giovanni Apruzzese*, Mauro Conti, and Ying Yuan*

In ACSAC, 2022

PDF Code Website Artifacts Reusable

Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

Ying Yuan, Giovanni Apruzzese, Mauro Conti

In ACM Digital Threats: Research and Practice (DTRAP) , 2023

PDF Code

“Are Adversarial Phishing Webpages a Threat in Reality?” Understanding the Users’ Perception of Adversarial Webpages

Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, and Gang Wang

In ACM The Web Conference (WWW), 2024

PDF Code Website Artifacts Available

It Doesn’t Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors

Qingying Hao, Nirav Diwan, Ying Yuan, Giovanni Apruzzese, Mauro Conti, Gang Wang

In Usenix Security, 2024

PDF Code

Beyond the West: Revealing and Bridging the Gap between Western and Chinese Phishing Website Detection

Ying Yuan, Giovanni Apruzzese, Mauro Conti

In (Elsevier) Computer & Security, 2024

PDF Code

talks

Are Adversarial Phishing Webpages a Threat in Reality?

Are Adversarial Phishing Webpages a Threat in Reality?